In Depth
In Depth
IT for manufacturing
-
Ivanti vulnerabilities explained: Everything you need to know
A series of vulnerabilities in Ivanti products have caused concern worldwide. Delve into some of the key issues arising from the Ivanti disclosures, looking at the vulnerabilities and their impact, what affected users should do, and learn about new... Continue Reading
-
Pseudo-SLC flash storage: What is it, what’s it good for and what does it cost?
Pseudo-SLC takes MLC, TLC flash and changes data storage at cell level to get better endurance and performance, but it’s mostly aimed at edge applications and is costly Continue Reading
-
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
-
Decoding zero trust in endpoint security: A practical guide for CISOs
The exponential increase in endpoints has vastly expanded the average organisation’s attack surface – address this by applying zero-trust best practice to endpoints Continue Reading
-
Industry 5.0: What is it and what does its future hold?
As Industry 5.0 becomes a more popular topic of conversation in the business tech world, critics have come out to question its legitimacy as a revolution instead of a progression Continue Reading
-
Jaguar TCS Formula E racing team making breakthroughs that will fine-tune electric road vehicles
The Jaguar TCS Formula E racing team is using software and digital simulations to continually improve its electric racing cars, leading to better performing electric vehicles on our roads Continue Reading
-
Toyota car plant outage shows database capacity planning is vital
How could database deletes and re-organisation take out car production for 36 hours at 14 plants? We drill down into the details of database capacity planning Continue Reading
-
Interview: Ashish Gupta, head of EMEA, HCLTech
It’s not just enterprises that changed their operating models during and after Covid, but also the suppliers that took them on the journey, HCLTech Europe’s head explains Continue Reading
-
Why IAM systems are crucial for securing multicloud architecture
As business tools evolve into cloud-based services, organisations are finding themselves becoming ever more reliant on the cloud, but how can data be secured across so many different platforms? Continue Reading
-
As Covid fades away, what’s the future of remote work in Europe?
Many IT leaders are still supporting some form of work from home, and a trend is beginning to take shape in Europe Continue Reading
-
What can security teams learn from a year of cyber warfare?
With the passing of the first anniversary of Russia’s invasion of Ukraine, we reflect on the ongoing cyber war, and ask what security leaders can learn from the past 12 months Continue Reading
-
Software enables new business model for Sweden-headquartered car manufacturer
One of the many things software now does with cars is to enable ‘mobility as a service’, a new business model that provides people with freedom of movement, without the cost and hassle of ownership Continue Reading
-
Securing low Earth orbit represents the new space race
The barriers to launching satellites into low Earth orbit are falling fast, and that brings new cyber security challenges Continue Reading
-
High tech meets agriculture in Denmark
Thanks to a few strategic investments, Denmark may one day become a major exporter of farming technology Continue Reading
-
How Finland develops its national plan for investment in innovation
A small country with limited resources, Finland carefully chooses strategic technologies to lead it into the future Continue Reading
-
Cyber security professionals share their biggest lessons of 2022
In the run-up to 2023, cyber security professionals are taking the time to reflect on the past few months and share their biggest lessons of 2022 Continue Reading
-
Storage hardware shortage causes and how to mitigate them
We look at the IT supply chain shortages that have hit data storage equipment, their causes and what organisations can do to work more smartly to mitigate them Continue Reading
-
Top 10 storage and backup customer stories of 2022
Here are Computer Weekly’s top 10 storage and backup customer stories of 2022 Continue Reading
-
How gamifying cyber training can improve your defences
Security training is the cornerstone of any cyber defence strategy. With ever-escalating online threats, it is now more important than ever that this training is an engaging experience Continue Reading
-
Indefinite storage: What it is and why you might need it
Indefinite storage addresses the issue that archived data may need to be kept well beyond the lifespan of the technology it was written for Continue Reading
-
Siemens aims to pioneer industrial metaverse usage
German engineering giant is exploring industrial metaverse use cases, and the Biosphere Foundation in Devon is proving out Siemens technology Continue Reading
-
An encouraging new conversation around sustainable IT, says Nordic CIO
What started as a whisper a decade ago has become distinctly audible chatter among IT leaders sharing best practices on how to protect the environment Continue Reading
-
Retail’s robotics reboot
Walmart and Amazon are among the retailers acquiring warehouse robotics firms, during a period of significant innovation in this space Continue Reading
-
Tech sector efforts to root out forced labour are failing
Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change Continue Reading
-
The cyber security impact of Operation Russia by Anonymous
The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war? Continue Reading
-
How to track greenhouse gas emissions
Companies from a range of sectors, as well as public authorities, are using software and data analytics to track greenhouse gas emissions, partly to meet new regulatory demands Continue Reading
-
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
-
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
Industry clouds are all the rage, but are they driven by marketing or customer need?
Industry clouds – cloud applications designed for specific sectors – are fashionable staples of supplier marketing, but are they what corporate IT is demanding? Continue Reading
-
Cloud ERP: Rise of the industry cloud
There is a new variable in the build or buy debate, and it’s all about the way cloud-based services connect internal and external business processes Continue Reading
-
How data analytics drives wind turbine power generation
Data analytics and related software lies behind the burgeoning wind turbine industry, with predictive maintenance to the fore. We find out how Continue Reading
-
How can I avoid an exodus of cyber talent linked to stress and burnout?
Cyber security professionals have played a crucial role during the pandemic, yet many feel like their employers aren’t providing adequate mental health support and have considered quitting their jobs as a result. What can employers do to help them? Continue Reading
-
Storage and 5G: Big impacts likely as wide-area topologies evolve
Enterprise 5G will boost the need for storage generally. It will also push capacity needs closer to the edge and create new locations for processing and storage Continue Reading
-
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
New supercomputer opens doors for researchers in Sweden
More than twice as powerful as its predecessor, a new supercomputer ushers in new opportunities for researchers who rely on artificial intelligence and machine learning Continue Reading
-
Is the IT sector beset by fear-mongering?
The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading
-
Edge storage: Four key points
Edge storage is driven by rapidly emerging edge computing and data gathering use cases. We look at why it makes sense to store data at the edge and the key challenges involved Continue Reading
-
Swedish researchers are patiently developing a useful quantum computer
By 2028, the Wallenberg Centre for Quantum Technology in Sweden expects to have a useful quantum computer Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
How software can help clean up emission-intensive industries
The potential to reduce emissions by making heavy industries and commercial buildings more efficient using software is immense. We explore the field Continue Reading
-
India is becoming a hotspot for IoT
India is set to be a cradle for internet of things deployments thanks to its vibrant economy and its potential to play a bigger role in global manufacturing Continue Reading
-
How the supply chain is handling Covid-19
Cost-cutting habits have left supply chains chasing their tails in the wake of the pandemic. We take a look at how they’re coping Continue Reading
-
Auditing for algorithmic discrimination
Despite the abundance of decision-making algorithms with social impacts, many companies are not conducting specific audits for bias and discrimination that can help mitigate their potentially negative consequences Continue Reading
-
Constructing the future for engineering – finding the right model where one size does not fit all
Design and engineering has rapidly evolved to be all about interconnected devices. We see how one of the leading manufacturing software suppliers is meeting the challenge Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Figeac Aero manages growth with DataCore software-defined storage
Global roll-out sees DataCore software-defined storage deployed on Huawei hardware to HQ and 14 worldwide sites as aero parts maker copes with acquisition and expansion Continue Reading
-
How to mitigate IoT security risks to tap business benefits
Security concerns are preventing many businesses from adopting IoT-based technologies, but with a bit of planning, the business benefits can be realised by mitigating the risk Continue Reading
-
Private 5G networks: Are they the right choice for you?
The concept of dedicated private mobile networks for large enterprises is not a new one, but with the advent of ultrafast 5G networks, they are starting to attract more interest Continue Reading
-
What 5G applications will transform your business?
The UK’s mobile network operators have started work on their 5G roll-outs, but what applications are most likely to gain enterprise traction for the new standard? Continue Reading
-
Securing your mobile estate – best practice for CIOs
The prevalence of mobile devices in every part of daily life is shaping how enterprises make choices about software and network infrastructure, but how do businesses go about securing these vast new endpoint estates? Continue Reading
-
How to get the basics of mobile device management right the first time
When adopting mobile device management, there are often fears around implementation and whether or not the strategy is even required Continue Reading
-
Exploring UCaaS: The main benefits for enterprises
Getting unified communications-as-a-service right can mean more agility, higher productivity, and cost control Continue Reading
-
Disaster planning: How to expect the unexpected
Focusing too much on specific disasters rather than considering an organisation’s data protection, network security and process requirements, can lead to unpredicted vulnerabilities Continue Reading
-
AI storage: Machine learning, deep learning and storage needs
Artificial intelligence workloads impact storage, with NVMe flash needed for GPU processing at the highest levels of performance – and there are other choices right through the AI data lifecycle Continue Reading
-
Skills, digital and the manufacturing sector
Manufacturing still accounts for a large amount of the UK economy, and when it comes to the fourth industrial revolution, the UK has aspirations to be a world leader – but does it have the digital know-how to back it up? Continue Reading
-
Debugging bug bounty programmes
Bug bounty programmes have recently become a popular method of vulnerability management, but poor programme management can lead to development teams becoming overwhelmed and bugs being missed Continue Reading
-
Mobile phones and health: is 5G being rolled out too fast?
European countries are rolling out 5G mobile communications at breakneck speed as they seek to gain a competitive edge over the US and Asia. But some scientists have raised questions about the effects of 5G mobile phone radiation on public health ... Continue Reading
-
How botnets pose a threat to the IoT ecosystem
While connected devices are transforming our personal and working lives in a multitude of ways, they are also a growing security risk – attackers are hijacking these devices and turning them into internet of things botnets Continue Reading
-
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
-
The rise of DevSecOps
The increasing complexity of security threats facing enterprises is leading to DevSecOps approaches, which combine operations and development with security, so that all business units are involved in security operations Continue Reading
-
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
Intelligent automation and the WAN: Is SD-WAN moving mainstream?
Take-up of software-defined networking in corporates is slower than expected. Where have we reached on the journey to software-controlled networks – and SD-WAN in particular – becoming the norm? Continue Reading
-
What are the current SD-WAN options for enterprises?
Software-defined wide area networking is well on its way to being a multi-billion dollar market. We assess the current state of the market and look at some of the options for enterprise CIOs and network managers Continue Reading
-
Employers turn to wearable technology to help staff manage work-life balance
Companies are realising that there are sound business reasons for ensuring their employees get enough sleep and exercise, so they are turning to wearable technology to help their staff stay healthy, despite the pressures of work Continue Reading
-
Servitisation: What it is and how it can transform companies
The idea that every product-based company needs to put service first is a radical shift in how businesses organise themselves. Is it more than rhetoric? Continue Reading
-
Matching disaster recovery to cyber threats
While it is important to take steps to prevent cyber attacks, they can still happen. That is why disaster recovery practices are equally critical Continue Reading
-
Cyber crime: why business should report it as soon as possible
Cyber crime is affecting a growing number of businesses, yet few are reporting it. Computer Weekly lifts the veil on cyber crime reporting, looking at the who, what, when, where, how and why Continue Reading
-
Manufacturers, technology and the fourth industrial revolution
A look at some of the innovations and technology investment focus areas for today’s manufacturing industry Continue Reading
-
Need for speed: designing a modern campus LAN
Just like datacentres before them, campus LANs are increasingly being defined by virtualisation and software-based controls. Next to this shift, the hardware also continues to improve as network owners look to keep pace with user demand Continue Reading
-
WD-40 oils sales and finance processes in Europe with Epicor
WD-40 has automated its business processes with Epicor ERP, finding the system’s service-oriented architecture good for providing flexibility in the company’s business growth Continue Reading
-
How artificial intelligence is fuelling engine maintenance innovation at Rolls-Royce
The engine maker has established an innovation centre to enable the company to deliver analytics and artificial intelligence-powered services to airlines using Rolls-Royce engines Continue Reading
-
Application and device security under the spotlight
The security of internet-connected devices and associated applications has become a significant concern, prompting suggestions legislation may be required, while the UK government’s recent Secure by Design review suggests several solutions, ... Continue Reading
-
GDPR: An overview of the latest data protection legislation
The forthcoming General Data Protection Regulation (GDPR) will have wide-ranging implications for every organisation that processes personal data. This comprehensive overview tells you what you need to know Continue Reading
-
Software-defined networking: gathering momentum in the enterprise?
Suppliers are pushing the benefits of software-defined networking harder than ever, and enterprises are starting to take the plunge rather than remaining on the sidelines Continue Reading
-
Network security in the digital transformation era
Network security has always been a core focus for CISOs and IT security managers, but in an era of digital transformation, we examine if network security strategies are keeping up with new and emerging cyber threats Continue Reading
-
Network security in the age of the internet of things
Wireless devices and smart technologies are increasingly being brought into the workplace, and pose a growing risk to company data Continue Reading
-
Businesses need to take cryptojacking seriously
Organisations must pay attention to cyber criminals hijacking computing resources to mine cryptocurrencies, because nearly half are affected and the impact is greater than many realise Continue Reading
-
Where the device hits the network – a mobile device management update
As business becomes increasingly mobile, we look at the latest trends in mobile device management to give businesses the edge Continue Reading
-
Formula 1: Mercedes team turns to big data in quest for victory in Grand Prix
Data analytics could help Mercedes-AMG Petronas Motorsport team gain an edge on rival Ferrari during the 2017 and 2018 Grand Prix season. Its head of IT, Matt Harris, reveals the team’s plans Continue Reading
-
How to implement a low-power WAN to support the IoT
We explore the options and the implementation process for an LPWAN to support internet of things projects in the enterprise Continue Reading
-
Blockchain starts to prove its value outside of finance
Technology behind bitcoin is being adopted in supply chains, power networks and even to support independent musicians Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
Growing possibilities for 3D printing
As 3D printing disrupts business and technology mandates, CIOs can gain new relevance as business enablers Continue Reading
-
How 3D printing will disrupt industry worldwide
The technology is helping startups model prototypes and inventory suppliers lop millions from supply chain costs Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
Case study: Philips takes agile approach to building bridges between business and IT
Dutch technology giant talks up the success of its attempts to embrace agile IT delivery methods, and how it's shaping future customer engagements Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
How building information modelling is changing the construction industry
The Cabinet Office says that by 2016, “collaborative 3D building information modelling will be required on all government projects” Continue Reading
-
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
-
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
How 3D printing impacts manufacturing
With the ability to create on-demand specialist tools, any initial investment in 3D printing technology could quickly pay for itself. Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading